Matt, a security administrator, has the VPN tunnel application set up so that after multiple incorrect attempts, the VPN service is disabled. Which of the following deterrent techniques does this describe?
A. Intrusions detection system
B. Baseline reporting
C. Failopen
D. Failsafe
Answer: D. Failsafe
Computer Science & Information Technology
You might also like to view...
Merge the local data models to create a global logical data model of the Wellmeadows Hospital case study. State any assumptions necessary to support your design.
What will be an ideal response?
Computer Science & Information Technology
The ________ button provides formatting choices for text that has been newly inserted into a document
A) Formatting B) Text C) Paste Options D) Options
Computer Science & Information Technology
In Datasheet view, you cannot move fields by dragging a field's column heading.?
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Who should receive training on the new software, and what topics should the training cover?
What will be an ideal response?
Computer Science & Information Technology